Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS via svg fileupload : Subrion CMS v 4.2.1 #777

Closed
security-breachlock opened this issue Aug 13, 2018 · 1 comment
Closed

XSS via svg fileupload : Subrion CMS v 4.2.1 #777

security-breachlock opened this issue Aug 13, 2018 · 1 comment
Assignees

Comments

@security-breachlock
Copy link

security-breachlock commented Aug 13, 2018

Affected software: Subrion CMS v 4.2.1

Type of vulnerability: XSS via svg fileupload

URL: https://subrion.org/

Discovered by: BreachLock

Website: https://www.breachlock.com

Author: Balvinder Singh

Description: SVG files can contain Javascript in <script> tags. Browsers are smart enough to ignore scripts embedded in SVG files included via IMG tags. However, a direct request for an SVG file will result in the scripts being executed.
So an embedded SVG as an attachment in an issue or avatar does not execute the code, but if a user clicks on the attachment the code will execute.

Proof of concept:

Step1: Login into the subrion using the admin role.
Step2: In the uploads choose file upload and upload a malicious SVG file.
Step3: Now open that file which was saved as 1.svg the below output will be shown.
URL Where XSS got executed.
http://localhost/subrion_cms_4.2.1/uploads/1%20-%20Copy.svg?_t=1534094451

sub

Vulnerable URL: http://localhost/subrion_cms_4.2.1/panel/uploads/#elf_l1_XA

4unkur pushed a commit that referenced this issue Aug 15, 2018
@4unkur 4unkur self-assigned this Aug 15, 2018
@security-breachlock
Copy link
Author

Hi,

Thanks for your positive response,

Did you use CVE ID to track these bugs?

Looking forward to hearing from you.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants